For 18 years CISSE has supported Cyber Security educators, researchers and practitioners in their efforts to improve curricula and foster discussion of current & emerging trends. Please submit your unpublished original paper in the field of Cyber Security/Information Assurance with a focus on education.

  • Strategic developments
  • Trends and vision for the discipline & Profession
  • Standards and guidelines
  • Governance and Control
  • ICT Supply Chair Risk Management
  • Mobile Security
  • Best Practices
  • Assessment & Accreditation
  • Awareness
  • Competitions
  • Social impact & Ethics
  • The Development of Cyber/IA as a discipline
  • Novel research in the field

Academic Papers

If your paper is chosen for presentation at our conference, it will also be published in our Journal, The Proceedings of the Colloquium for Information Systems Security Education. Check out last year's edition here; it is available as an e-book and softcover.

All submissions must be anonymized to allow for double-blind reviewing. Authors are expected to make a good faith effort to make their submissions geographically and institutionally anonymous and should not identify themselves either explicitly or by implication (e.g., through references or acknowledgments). Submissions violating formatting or anonymization instructions will be returned without review.

Papers on original unpublished results may be at most 10 pages in length (single-column, single-spacing, at least 11 point font, with reasonable margins, including figures, tables, and references). Accepted papers will be published in the conference proceedings and it will be required that at least one of the authors register and attend the conference to present the paper.

Student Papers

In the above areas of focus

Criteria for eligibility-All the following criteria must be met:

  • Submitting author must opt-in to the competition during the regular submission process and follow all the instructions provided on the submission site
  • The presenting author must be an undergraduate or graduate student of an educational institution of collegiate grade who is devoting more than half-time to studies within the institution, at the time the paper was written
  • The paper must be submitted and accepted during the regular "call for papers" process
  • Student must present the paper during the conference
  • One lucky Student Paper will be selected for the Erich Spengler Student Cyber Paper-award. The awardee will receive free registration, plus a travel and hotel stipend
 

Round Table

Works in progress/discussion papers

We will also provide opportunities for discussion of research under development or novel ideas. Submissions in this category will be reviewed for relevance of content. However they will not be subject to the same stringent reviews as the paper submissions. These papers may focus on technology, theories, trends or topics of interest for faculty and should be between 500-600 words in "Word" format.

Accepted work in this category will be presented in a "round -robin" Round Table format. Open dialogue and feedback will be facilitated by a formally designated discussant/coordinator at each table. The intention is to help presenters focus and refine their prospective work for development into subsequent paper presentations at CISSE, or other conferences. Accepted work in this category will not be published in the conference proceedings.

Poster Sessions

Faculty, Researchers & Students Only

Faculty, Students and Researchers are invited to submit requests for the poster sessions. Poster sessions are non-commercial presentations of topics of interest to the community. The goal of the poster session is to stimulate conversations in the community. Posters present an opportunity to contribute to the conversation without the full process of formal review and the topic and time constraints of formal papers and conference sessions.

Research

A presentation of research information by an individual or research teams at the CISSE conference with an Information Assurance focus. This may include on-going research, smaller research projects, projects not yet ready for full publication, follow-on efforts for previously published material, late breaking developments to share with the community, or research which is best presented graphically rather than in the context of a paper.

Teaching and Education

A presentation on approaches in pedagogy related to Cyber Security. This includes novel approaches to teaching, reinforcing and learning in the area of Cyber Security. Topics may include descriptions of special events, academic focused competitions, and student projects in Cyber Security which demonstrate how they directly contribute to a Cyber Security education. Other items in this area may include novel course designs, or cooperative efforts with areas of academia not normally considered core to information security (e.g. Course module on the design of clothing to increase cyber security by reducing signal dispersion from transmission lines in wearable computers), or approaches for reaching different audiences of information security education.

Thought Stimulation and Challenges

A presentation of a Challenge or of a key concept in Cyber Security and Cyber Security Education designed to stimulate discussion, thought and potential action or research in the area. These may develop into future workshops, birds-of-a-feather, or conference sessions in the future, or they may not, but for now they present interesting challenges, worth thinking about. These posters may provide a basis for research topics to students and scholars. The poster should be designed in as stimulating a manner as possible.

Awards

At least one award will be made in each category. The awards will be presented during the CISSE Recognition Dinner.

Administrative Details

An abstract in "Word" will be submitted for review and all accepted Posters must be accompanied by one registered conference attendee. The work will be reviewed for relevance of content. However they will not be subject to the same stringent reviews as the paper submissions.

The posters will be available throughout the Colloquium. During the designated poster sessions a member of the poster team should be in attendance and near the poster to answer questions posed by passing colleagues. Team members are encouraged to be available near their posters at other times as well. Contact information for the presenter(s) must be available on the poster.

Abstracts for posters must be submitted no later than 1 May, 2015. Acceptance will be subject to availability of space. Earlier is better.

Presentations will consist of a single poster or display not more than 4 feet wide, 9 feet tall, and 3 feet deep provided by the submitter. Posters must be free standing (floor length or table top), lean against a wall or be mounted on an easel provided by the presenter. (CISSE will not provide Poster Boards, supplies or easels. Table top space will be provided when requested).

Poster makers are encouraged to make their posters as graphical as possible including the use of 3-dimensional attachments to their posters. Handouts, brochures or other information sheets may accompany the poster, but they must either be in a container affixed to the poster, or placed on the tabletop in front of the poster.

emblem-contact
The Colloquium for
Information Systems Security Education

49004 Packard Ct.
Belleville, MI 48111
(734) 325-6823
This email address is being protected from spambots. You need JavaScript enabled to view it.